Malware

150+ Companies Top Executives are Hacked Via Successful Targeted Phishing Attacks

According to the security group, Group-IB Threat Intelligence, more than 150 companies’ top executives are hacked via successful targeted phishing attacks, they also got evidence regarding corporate email account establishment of an Asia-based company.

Well, they stated that a cybercrime company had breached the email accounts of high ranking executive since-mid 2019. 

This conflict is dubbed as ‘PerSwaysion,’ and it is detected that this cyberattack campaign has leveraged the Microsoft file-sharing assistance including Power, SharePoint, and OneNote to eject extremely targeted phishing attacks. 

Top Executives Targeted

Well, this conflict has mainly focused on the victims of high-ranking officers, and are above 20 Office 365 accounts of executives, presidents, and managing directors.

However, the high-profile victims managed to establish in the US, Canada, whereas, the remaining are in global and local financial centers such as Germany, UK, Netherlands, Hong Kong, and Singapore, and many other countries.

After getting all the data by using the server IMAP APIs, next, they create a PDF file that contains the data of the current victim, such as full name, email address, legitimate company name. Once they are done with the PDF file, next, they will send these files to a choice of new people who serve to be external of the victim’s organization and carry essential professions. 

Once the operators of PerSwaysion conducted new spear-phishing operations from a negotiated account, they just delete the representing emails from the outbox folder to evade disclosure, said the Group-IB.

At first, Group-IB was inadequate to identify the motive of the hackers, as they are gaining access only to the email accounts.

Thus there are three steps by which PerSwaysion’s whole scheme could be detected to avoid traffic detection and automated threat intelligence gathering:-

  • Initially, each victim gets an email carrying a regular PDF file as an email attachment. Once the victims unlocked the file, they would be demanded to tap a link to inspect the original content.
  • After opening the link, it will redirect the victims to a Microsoft Sway page, where a related file would summon the victim to tap on another link.
  • And this final link will redirect the victims, or we can say the officer to a page, imitating the Microsoft Outlook login page, where hackers will quickly accumulate the victim’s essential data.

The operator of the PerSwaysion campaign always move fast from the very first moment to accomplish a successful phish and usually obtained access to the hacked email accounts within a day. Group-IB stated that approaching on prevailing evidence, the PerSwaysion group resembles to be composed of members from Nigeria and South Africa, and are utilizing a phishing toolkit produced and created by a Vietnamese programmer. 

More importantly, the group’s chief seems to be a defendant operating by the name of “Sam.” As we said above that PersDwaysion generally deletes all the data after they are done with the hacking process. 

Thus there’s no explicit confirmation on how attackers are utilizing negotiated corporate data. Well, many researchers consider that these data can be sold to other financial scammers to carry out regular financial scams.

Therefore, Group-IB has made an online web-page where everyone can easily verify if their email address was yielded as a component of PerSwaysion attacks or not. And they also said that one should just use it for entering your email if you’re profoundly anticipating being attacked.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

Microsoft Announced a Defender Antivirus for Linux – Android & iOS Version Coming Soon

Microsoft Data Leak – 250 Million Microsoft Customer Service Support Records Exposed Online

Hackers Exploiting Microsoft Sharepoint Vulnerability to Hack Government Organization Networks

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Cactus Ransomware Exploiting Qlik Servers Vulnerability

The Cactus ransomware gang has been exploiting vulnerable Qlik sense servers ever since November 2023…

1 day ago

Hackers Abuse Autodesk Drive For Hosting Weaponized PDF Files

Autodesk Drive is a data-sharing platform for organizations to share documents and files in the…

1 day ago

MuddyWater Hackers Abusing Legitimate RMM Tool to Deliver Malware

The Iranian state-sponsored threat actor MuddyWater has been observed exploiting a legitimate remote monitoring and…

1 day ago

Hackers Actively Exploiting WP Automatic Updates Plugin Vulnerability

Hackers often target WordPress plugins as they have security loopholes that they can exploit to…

1 day ago

Microsoft Releases Historical MS-DOS 4.0 Source Code to the Public

In a significant move for tech enthusiasts and historians alike, Microsoft has made the source…

1 day ago

PoC Exploit Released For Critical Flowmon Vulnerability

Progress addressed a critical vulnerability last week, which was associated with an unauthenticated Command injection…

1 day ago